Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure multi-party e-commerce protocols
~
Birjoveanu, Catalin V.
Linked to FindBook
Google Book
Amazon
博客來
Secure multi-party e-commerce protocols
Record Type:
Electronic resources : Monograph/item
Title/Author:
Secure multi-party e-commerce protocols/ by Catalin V. Birjoveanu, Mirela Birjoveanu.
Author:
Birjoveanu, Catalin V.
other author:
Birjoveanu, Mirela.
Published:
Cham :Springer International Publishing : : 2022.,
Description:
x, 109 p. :ill., digital ;24 cm.
[NT 15003449]:
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
Contained By:
Springer Nature eBook
Subject:
Electronic commerce - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-030-99351-1
ISBN:
9783030993511
Secure multi-party e-commerce protocols
Birjoveanu, Catalin V.
Secure multi-party e-commerce protocols
[electronic resource] /by Catalin V. Birjoveanu, Mirela Birjoveanu. - Cham :Springer International Publishing :2022. - x, 109 p. :ill., digital ;24 cm. - SpringerBriefs in computer science,2191-5776. - SpringerBriefs in computer science..
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.
ISBN: 9783030993511
Standard No.: 10.1007/978-3-030-99351-1doiSubjects--Topical Terms:
590545
Electronic commerce
--Security measures.
LC Class. No.: HF5548.32 / .B2 2022
Dewey Class. No.: 381.142
Secure multi-party e-commerce protocols
LDR
:02336nmm a2200373 a 4500
001
2301829
003
DE-He213
005
20220630081757.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783030993511
$q
(electronic bk.)
020
$a
9783030993504
$q
(paper)
024
7
$a
10.1007/978-3-030-99351-1
$2
doi
035
$a
978-3-030-99351-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HF5548.32
$b
.B2 2022
072
7
$a
UF
$2
bicssc
072
7
$a
KJE
$2
bicssc
072
7
$a
COM064000
$2
bisacsh
072
7
$a
UXJ
$2
thema
072
7
$a
KJE
$2
thema
082
0 4
$a
381.142
$2
23
090
$a
HF5548.32
$b
.B618 2022
100
1
$a
Birjoveanu, Catalin V.
$3
3601586
245
1 0
$a
Secure multi-party e-commerce protocols
$h
[electronic resource] /
$c
by Catalin V. Birjoveanu, Mirela Birjoveanu.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
x, 109 p. :
$b
ill., digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
SpringerBriefs in computer science,
$x
2191-5776
505
0
$a
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
520
$a
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.
650
0
$a
Electronic commerce
$x
Security measures.
$3
590545
650
1 4
$a
e-Commerce and e-Business.
$3
3591724
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Application in Administrative Data Processing.
$3
3594379
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Security Services.
$3
3382346
700
1
$a
Birjoveanu, Mirela.
$3
3601587
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in computer science.
$3
1567571
856
4 0
$u
https://doi.org/10.1007/978-3-030-99351-1
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9443378
電子資源
11.線上閱覽_V
電子書
EB HF5548.32 .B2 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login